Búsqueda avanzada


Área de conocimiento




Filtrar por:

Tipo de publicación

Autores

Años de Publicación

Editores

Repositorios Orígen

Tipos de Acceso

Idiomas

Materias

Selecciona los temas de tu interés y recibe en tu correo las publicaciones más actuales

29 resultados, página 3 de 3

On-farm storage loss estimates of maize in Kenya using community survey methods

Hugo De Groote Anani Bruce (2023, [Artículo])

Maize is the most important staple in sub-Saharan Africa (SSA), with highly seasonal production. High storage losses affect food security, but good estimations are lacking. A new method using focus group discussions (FGDs) was tested with 121 communities (1439 farmers, 52% women) in Kenya's six maize-growing zones, to estimate the maize losses to storage pests and analyze farmer practices. As control strategies, half of the farmers used chemical pesticides (49%), while hermetic bags (16%) and botanicals (15%) were also popular. Relative loss from weevils in the long rains was estimated at 23%, in the short rains 18%, and annually 21%. Fewer farmers were affected by the larger grain borer (LGB) than by maize weevils: 42% in the long rainy season and 32% in the short rainy season; losses from LGB were also smaller: 19% in the long season, 17% in the short season, and 18% over the year. Total storage loss, from both species combined, was estimated at 36%, or 671,000 tonnes per year. The greatest losses occur in the humid areas, especially the moist mid-altitudes (56%), and with smaller loss in the drylands (20–23%). Extrapolating the point data and overlaying with the maize production map shows the geographic distribution of the losses, with the most important area found around Lake Victoria. FGDs provide convenient and cheap tools to estimate storage losses in representative communities, but a total loss estimate of 36% is higher than is found in other studies, so its accuracy and framing effects need to be assessed. We conclude that storage pests remain a major problem, especially in western Kenya, and that the use of environmentally friendly technologies such as hermetic storage and botanicals needs more attention, both by the public extension service and private agrodealers.

Larger Grain Borer Maize Weevil CIENCIAS AGROPECUARIAS Y BIOTECNOLOGÍA MAIZE STORAGE LOSSES PESTS SURVEY METHODS

Evaluación de sobrecarga por cifrado en redes multisalto para la internet de las cosas médicas

Evaluation of encryption overload in multihop networks for the internet of medical things

Adrián Neftalí Sánchez (2022, [Tesis de maestría])

El Internet de las cosas médicas (IoMT por sus siglas en ingles) permitirá habilitar servicios y aplicaciones enfocados a diagnósticos más precisos y mejorar la cobertura efectiva de los sistemas de salud. Para esto, es necesario la recolección y envío de información de salud de las personas a través de sensores que monitorean continuamente los signos vitales de las personas. El envío a través de redes para el internet de las cosas (IoT por sus siglas en ingles) de información de salud plantea varios retos importantes para los sistemas de comunicaciones. Uno de los más relevantes es el de preservar la confidencialidad y privacidad de la información desde su recolección hasta su tratamiento y almacenamiento. Esto es especialmente complejo considerando que los sensores utilizados suelen tener pocos recursos en términos de memoria y capacidad de procesamiento. Por lo tanto se han propuesto una serie de algoritmos que cifran esta información de una manera eficiente usando los recursos limitados con los que cuentan estos dispositivos. Estos algoritmos han sido evaluados desde la perspectiva de consumo de potencia y rendimiento. Sin embargo, no se ha hecho una evaluación de cómo éstos afectan el comportamiento de una red IoMT en su conjunto. El presente trabajo de investigación busca evaluar el comportamiento de la implementación de una red IoMT cuya pila de tecnologías en su capa de seguridad utilice algoritmos de cifrado ligero para proteger información desde el momento de conformación de la red. Para realizar esta evaluación se consideraron 5 candidatos de algoritmos de cifrado ligero del concurso que está llevando a cabo el instituto nacional de estándares y tecnología de los Estados Unidos (NIST por sussiglas en ingles), con los cuales utilizando métricas de red, se evaluó el comportamiento de la red al variar entre los distintos algoritmos de cifrado ligero además de compararlos con una implementación del cifrado por defecto AES-128 y una implementación sin ningún tipo de cifrado. Para realizar las diferentes implementaciones con las que se realizó esta evaluación se utilizó el sistema operativo IoT Contiki-ng el cual fue implementado tanto en dos distintos simuladores (Cooja y Renode) como en el dispositivo físico Sensortag-CC2650.

The Internet of medical things (IoMT) will enable services and applications focused on more accurate diagnoses and improve the effective coverage of health systems. For this, it is necessary to collect and send people’s health information through sensors that continuously monitor people’s vital signs. Delivering health information over internet of things networks (IoT) poses several significant challenges for communications systems. One of the most relevant is to preserve the confidentiality and privacy of the information from its collection to its treatment and storage. This is especially complex considering that the sensors used tend to have few resources in terms of memory and processing capacity. Therefore, a series of algorithms have been proposed that encrypt this information efficiently using the limited resources available to these devices. These algorithms have been evaluated from the perspective of power consumption and performance. However, no assessment has been made of how these affect the behavior of an IoMT network as a whole. This research work seeks to evaluate the behavior of an implementation of an IoMT network whose stack of technologies in its security layer uses lightweight encryption algorithms to protect information from the moment the network is formed. To carry out this evaluation, 5 candidates for lightweight encryption algorithms from the contest being carried out by National Institute of Standards and Technology (NIST) were considered, with which, using network metrics, the behavior of the network was evaluated for different lightweight encryption algorithms in addition to comparing them. with an implementation of the default encryption AES-128 and an implementation without any encryption. To carry out the different implementations with which this evaluation was carried out, the IoT Contiki-ng operating system was used, which was implemented both in two different simulators (Cooja and Renode) and in the physical device Sensortag-CC2650.

IoT, IoMT, Contiki-NG, WSN, 6LoWPAN, RPL, IPv6, DTLS, TLS, PSK, TinyDTLS, CoAP, CC2650, CC2538, Grain-128AEAD, Xoodyak, ASCON, GIFT-COFB, TinyJambu, AES-128 IoT, IoMT, Contiki-NG, WSN, 6LoWPAN, RPL, IPv6, DTLS, TLS, PSK, TinyDTLS, CoAP, CC2650, CC2538, Grain-128AEAD, Xoodyak, ASCON, GIFTCOFB, TinyJambu, AES-128 INGENIERÍA Y TECNOLOGÍA CIENCIAS TECNOLÓGICAS TECNOLOGÍA DE LAS TELECOMUNICACIONES TECNOLOGÍA DE LAS TELECOMUNICACIONES